Search Results - (( java implementation modified algorithm ) OR ( knowledge utilisation data algorithm ))
Search alternatives:
- implementation modified »
- knowledge utilisation »
- java implementation »
- utilisation data »
- data algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…By defining the data, machines (or computers) will be able to create information and later on transform it into knowledge. …”
Get full text
Get full text
Thesis -
6
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis -
7
Nearest neighbour group-based classification
Published 2010“…The purpose of group-based classification (GBC) is to determine the class label for a set of test samples, utilising the prior knowledge that the samples belong to same, but unknown class. …”
Get full text
Get full text
Get full text
Article -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
9
Predictive modeling of chlorophyll a for tropical lake by means of hybrid evolutionary algorithm (HEA)
Published 2013“…Outcomes of this research offers an original contribution to the knowledge domain Ecology of Tropical Lakes by successfully applying data driven models (HEA).…”
Get full text
Get full text
Conference or Workshop Item -
10
A case study on quality of sleep and health using Bayesian networks
Published 2012“…A structural learning is conducted on the data to learn the correct network structure. There are several phases involved including implementation of the learning algorithms, integration of prior knowledge through the whitelist argument and arc setting to form directed acyclic graphs. …”
Get full text
Article -
11
Exploiting Bayesian belief network for adaptive IP-reuse decision
Published 2009“…In this work, the concept of Bayesian Belief Network (BBN) is utilised and incorporated into the proposed framework. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
13
An improvement of back propagation algorithm using halley third order optimisation method for classification problems
Published 2020“…This algorithm utilises first order optimisation method namely Gradient Descent (GD) method which attempts to minimise the error of network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A grid enabled E-theses and dissertations repository system
Published 2002“…For future direction, research will be focused on searching algorithm using data mining or pattern discovery to minimise the respond time.…”
Get full text
Get full text
Get full text
Article -
15
A framework for automatic modelling of survival using fuzzy inference.
Published 2012“…After the initialisation of the fuzzy inference structure, the replication data (until time to event) will be subject to be trained using the gradient descent and nonnegative least square algorithm to estimate the conditional event probability. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
18
Malaysian secondary boarding school menu planning system / Suliadi F. Sufahani and Anuar M. Yusof
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd...
Published 2024“…Discriminant function analysis (DFA), binary logistic regression (BLR), and several machine learning (ML) algorithms (random forest (RF), support vector machines (SVM), and linear discriminant analysis (LDA)) were used to statistically analyse the data. …”
Get full text
Get full text
Get full text
Thesis -
20
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…However, due to the drawbacks of the conventional algorithm as well as the heuristic algorithms handling complicated and multi-objective reservoir optimisation, the advantages of the strategy of simultaneous exploration and exploitation led to the decision to utilise meta-heuristic algorithms in this study. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
